Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ZDTA Exam Dumps - Zscaler Digital Transformation Administrator

Go to page:
Question # 25

What is the preferred method for authentication to access oneAPI?

A.

OpenID Connect (OIDC)

B.

Transport Layer Security (TLS)

C.

Security Assertion Markup Language (SAML)

D.

System for Cross-domain Identity Management (SCIM)

Full Access
Question # 26

Which of the following is a common use case for adopting Zscaler’s Data Protection?

A.

Reduce your Internet Attack Surface

B.

Prevent download of Malicious Files

C.

Prevent loss to Internet and Cloud Apps

D.

Securely connect users to Private Applications

Full Access
Question # 27

Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?

A.

Tunnel v2.0 for on-trusted and tunnel v2.0 for off-trusted

B.

None for on-trusted and none for off-trusted

C.

None for on-trusted and tunnel v2.0 for off-trusted

D.

Tunnel v2.0 for on-trusted and none for off-trusted

Full Access
Question # 28

Which Platform Service enables visibility into the headers and payload of encrypted transactions?

A.

Policy Framework

B.

TLS Decryption

C.

Reporting and Logging

D.

Device Posture

Full Access
Question # 29

An administrator wants to allow users to access a wide variety of untrusted URLs. Which of the following would allow users to access these URLs in a safe manner?

A.

Browser Isolation

B.

App Connector

C.

Zscaler Private Access

D.

Zscaler Client Connector

Full Access
Question # 30

Which is an example of Inline Data Protection?

A.

Preventing the copying of a sensitive document to a USB drive.

B.

Preventing the sharing of a sensitive document in OneDrive.

C.

Analyzing a customer’s M365 tenant for security best practices.

D.

Blocking the attachment of a sensitive document in webmail.

Full Access
Question # 31

Which filtering policy blocked access to the Network Application?

A.

Sandbox

B.

Browser Control

C.

Firewall Filtering

D.

DLP

Full Access
Question # 32

How does Zscaler Risk360 quantify risk?

A.

The number of risk events is totaled by location and combined.

B.

A risk score is computed based on the number of remediations needed compared to the industry peer average.

C.

Time to mitigate each identified risk is totaled, averaged, and tracked to show ongoing trends.

D.

A risk score is computed for each of the four stages of breach.

Full Access
Go to page:

Hot Exams